[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 706/06 - Six Ubuntu Security Notices:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

 UNIRAS (UK Government CERT) Briefing - 706/06 dated 02.11.06 time 12:30
 UNIRAS is part of NISCC (the UK National Infrastructure Security
 Co-ordination Centre)
______________________________________________________________________________

 UNIRAS material is available from the NISCC website at www.niscc.gov.uk
______________________________________________________________________________

Title
=====

Six Ubuntu Security Notices:

1. USN-369-2 - postgresql-8.1 vulnerabilities   

2. USN-370-1 - screen vulnerability

3. USN-371-1 - Ruby vulnerability

4. USN-372-1 - imagemagick vulnerability

5. USN-373-1 -  mutt vulnerabilities

6. USN-374-1 - wvWare vulnerability

Detail
======

1. USN-369-1 fixed three minor PostgreSQL 8.1 vulnerabilities for 
Ubuntu 6.06 LTS. This update provides the corresponding update for Ubuntu 6.10.

2. cstone and Rich Felker discovered a programming error in the UTF8 string 
handling code of "screen" leading to a denial of service.  If a crafted 
string was displayed within a screen session, screen would crash or 
possibly execute arbitrary code.

3. An error was found in Ruby's CGI library that did not correctly check 
for the end of multipart MIME requests.  Using a crafted HTTP request, a 
remote user could cause a denial of service, where Ruby CGI applications 
would end up in a loop, monopolizing a CPU.

4. M. Joonas Pihlaja discovered that ImageMagick did not sufficiently
verify the validity of PALM and DCM images. When processing a
specially crafted image with an application that uses imagemagick,
this could be exploited to execute arbitrary code with the
application's privileges.

5. Race conditions were discovered in mutt's handling of temporary files.  
Under certain conditions when using a shared temp directory (the 
default), other local users could overwrite arbitrary files owned by the 
user running mutt.  This vulnerability is more likely when the temp 
directory is over NFS.

6. An integer overflow was discovered in the DOC file parser of the wv 
library.  By tricking a user into opening a specially crafted MSWord 
(.DOC) file, remote attackers could execute arbitrary code with the 
user's privileges. 




1.



=========================================================== 
Ubuntu Security Notice USN-369-2          November 01, 2006
postgresql-8.1 vulnerabilities
CVE-2006-5540, CVE-2006-5541, CVE-2006-5542
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.10:
  postgresql-8.1                           8.1.4-7ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-369-1 fixed three minor PostgreSQL 8.1 vulnerabilities for Ubuntu 6.06 LTS.
This update provides the corresponding update for Ubuntu 6.10.

Original advisory details:

  Michael Fuhr discovered an incorrect type check when handling unknown
  literals. By attempting to coerce such a literal to the ANYARRAY type,
  a local authenticated attacker could cause a server crash. (CVE-2006-5541)
  
  Josh Drake and Alvaro Herrera reported a crash when using aggregate
  functions in UPDATE statements. A local authenticated attacker could
  exploit this to crash the server backend. This update disables this
  construct, since it is not very well defined and forbidden by the SQL
  standard. (CVE-2006-5540)
  
  Sergey Koposov discovered a flaw in the duration logging. This could
  cause a server crash under certain circumstances. (CVE-2006-5542)
  
  Please note that these flaws can usually not be exploited through web
  and other applications that use a database and are exposed to
  untrusted input, so these flaws do not pose a threat in usual setups.


Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1.diff.gz
      Size/MD5:    52401 af21a893e2947a1e467d5e98663031e7
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1.dsc
      Size/MD5:     1176 04b8d59e5fdb061ebc2a0b1e86c4220d
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4.orig.tar.gz
      Size/MD5: 11312643 c6554a0ef948ab2b18b617954e1788fe

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.4-7ubuntu0.1_all.deb
      Size/MD5:  1442056 4263930dd4391fd81944a82c372f3cba

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   152924 5fb69c85456514e2f78072efc3956ec0
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   344912 a34d581ae43ce95f0758f3128d2c07e5
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   173428 733938955a0112fb6fedc835f5456052
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   175450 5412a17f17d49c3090cb7fcbcc136e7b
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   312606 3b5e8a5d6cffa8b48f82575458503d22
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   206680 559c766535f53918647783563d797582
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:  3256168 a0bbda514074cd42271529eb07e94ecd
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   769328 3323f21f5fd11c660e74e0b2a3d480f6
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   619156 08c3d6be3fa11d19eccdbb9986e659d4
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   169362 d5cec1f551207e2e734bf6fab2317ef9
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   163748 b99d7a9fafcfd3e8b616ef1f483c4da9
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   164056 17bb99f0f7ab3edf2391271d64e0feda
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-7ubuntu0.1_amd64.deb
      Size/MD5:   596412 1d3f23de9e73e3f3c97b2532d7b4c5c8

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   152234 5ec67e24a0c39547dd1a4594f43c9ba2
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   342026 a3628ec749e0d789575496d8ef383a31
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   172122 21c2f681f5c623d65d8a8a83ca5ee4fe
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   175124 547e40b4cdb2fb8f6c01a443b21a9edb
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   305840 49c8db9e9ee18d99ce45c1b4cc64c3b6
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   202648 e02cd0e97ea04f3ed9808562cdd61b16
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:  3155738 8b8a255cfc36bb6207d4972d30114c4f
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   739926 42db79545ef912384d45a9e321aa7889
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   587552 7b3612cd963fd40b7626f19940f5cc85
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   168202 da95c00f91be43d6c4651144fd5d78ce
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   161630 f781234805909d6efabcd1e0ec42bfc5
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   163002 76e987350cb8feb799663e0b72c77a4f
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-7ubuntu0.1_i386.deb
      Size/MD5:   596394 460bfba660947b82c1616353d5171e96

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   153756 f269e9370aa649d122994aa7907104b5
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   339348 af5a24b146f61084c6b94b796d3a653a
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   174288 5142ebdd438cf151e0f405ff4855f2dc
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   178260 0d0a813c48e899bb9cff5a41a8398fbd
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   308032 c11439a9a23ead70ddb60fd1b2264003
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   204732 019d45db40122878bd2f64e25b58702f
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:  3555700 d07b565f5be335ff6761da96b7d88f26
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   779658 251e7a8eed17c33eb868dcf0018970d7
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   639686 bea4a0e9f449f75f56554c79f252e9fd
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   169106 16226facd3e893b889cb72eb9e8df42c
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   163948 d9996a974e94652834ca4c1d1df5013d
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   165024 2df3b4f4878f006eec5ce7305672d752
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-7ubuntu0.1_powerpc.deb
      Size/MD5:   596432 d35808efc5c022dab90461e0dccfccca

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   151610 d7e6bb8c226664538a41c05bd8efcc80
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   335088 b0309c99b0f904414afaf29e27ef4aa0
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   171724 474c5c7903229f404bc042d00910fe34
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   173454 dcd4fc4f2550bf80130fb7e1b02da2b4
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   305174 268c509165f58d3ef83491e49cfbdda2
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   201412 d5e3d6dcca7b83ba18a90da314443c26
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:  3482382 515aaee1feeda7549efb2543cf30b167
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   754506 cc62cd3ba7ecb37f88a0a13abb0c7a49
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   598348 fb2b4f26146e27d75c2ed580f2b59be0
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   167762 69bfb050570fc151fb2d251855ded8f4
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   162366 4a38b861e8eb528bc4e96e1f64b27a04
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   163042 68c9e99678283f3b2cf0f73db8b845e2
    http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.4-7ubuntu0.1_sparc.deb
      Size/MD5:   596424 5a9b3e7626e3664578060f8292199f62




2.


=========================================================== 
Ubuntu Security Notice USN-370-1           October 31, 2006
screen vulnerability
CVE-2006-4573
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  screen                                   4.0.2-4.1ubuntu2.5.04

Ubuntu 5.10:
  screen                                   4.0.2-4.1ubuntu2.5.10

Ubuntu 6.06 LTS:
  screen                                   4.0.2-4.1ubuntu5.6.06

Ubuntu 6.10:
  screen                                   4.0.2-4.1ubuntu5.6.10

After a standard system upgrade you need to restart any running screen 
sessions to effect the necessary changes.

Details follow:

cstone and Rich Felker discovered a programming error in the UTF8 string 
handling code of "screen" leading to a denial of service.  If a crafted 
string was displayed within a screen session, screen would crash or 
possibly execute arbitrary code.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.04.diff.gz
      Size/MD5:    34158 cba61559263bcc4370232cdadc6e582f
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.04.dsc
      Size/MD5:      648 f6c73c29a88533bec08a0c7a596af8da
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2.orig.tar.gz
      Size/MD5:   840519 ed68ea9b43d9fba0972cb017a24940a1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.04_amd64.deb
      Size/MD5:   600012 b2f316afe7637709a5da52356d0e05ec

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.04_i386.deb
      Size/MD5:   577644 d8b407353de17ecda15979be0f42f892

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.04_powerpc.deb
      Size/MD5:   593876 3fa2c203b8aa9f7178d9489bc547845a

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.10.diff.gz
      Size/MD5:    34163 6070d837711a9eb26aed7f6e253b8976
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.10.dsc
      Size/MD5:      648 b10627fdfffa9eb56c883febe4e1d879
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2.orig.tar.gz
      Size/MD5:   840519 ed68ea9b43d9fba0972cb017a24940a1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.10_amd64.deb
      Size/MD5:   608874 cafd5e3cebd014b2f91ad1abc9be6ea7

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.10_i386.deb
      Size/MD5:   580646 a5e927874bef8d3989d728758bf37c4a

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.10_powerpc.deb
      Size/MD5:   598392 8e667231c080709c1900d543cdc6575f

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu2.5.10_sparc.deb
      Size/MD5:   596636 6bb3b98e8575d7c5bedf3c4306c37bd8

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.06.diff.gz
      Size/MD5:    54523 ffd98c68cd22cec18f7017b0e26e0003
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.06.dsc
      Size/MD5:      648 cc1098ba02b1f371e2d8afe72a06802c
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2.orig.tar.gz
      Size/MD5:   840519 ed68ea9b43d9fba0972cb017a24940a1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.06_amd64.deb
      Size/MD5:   609606 2ed54b9ddd4626ea693d0c549c1ddefa

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.06_i386.deb
      Size/MD5:   580748 38ef03be6459a041f92668b550b3efa7

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.06_powerpc.deb
      Size/MD5:   598866 3213b3cef084f98fa010a719535aa72a

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.06_sparc.deb
      Size/MD5:   594890 bd551cba69f370ed1ffc2aa3b9eb39ec

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.10.diff.gz
      Size/MD5:    54524 eebf0a7b77625db94987d03d0171252f
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.10.dsc
      Size/MD5:      648 e4cb0fca076db296eaf91f57b87e32f1
    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2.orig.tar.gz
      Size/MD5:   840519 ed68ea9b43d9fba0972cb017a24940a1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.10_amd64.deb
      Size/MD5:   606076 d302fc97f5890de4a22ef77580f04c00

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.10_i386.deb
      Size/MD5:   584358 f01e1a4282ac189db902c252f92d6a7f

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.10_powerpc.deb
      Size/MD5:   599994 ac26d1da763cdad66e9fa8b1846968e6

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/s/screen/screen_4.0.2-4.1ubuntu5.6.10_sparc.deb
      Size/MD5:   597784 76c7fd9e1ed7b229fb5de57f60394db1



3.


=========================================================== 
Ubuntu Security Notice USN-371-1           October 31, 2006
ruby1.8 vulnerability
CVE-2006-5467
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libruby1.8                               1.8.1+1.8.2pre4-1ubuntu0.5

Ubuntu 5.10:
  libruby1.8                               1.8.2-9ubuntu1.3

Ubuntu 6.06 LTS:
  libruby1.8                               1.8.4-1ubuntu1.2

Ubuntu 6.10:
  libruby1.8                               1.8.4-5ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

An error was found in Ruby's CGI library that did not correctly check 
for the end of multipart MIME requests.  Using a crafted HTTP request, a 
remote user could cause a denial of service, where Ruby CGI applications 
would end up in a loop, monopolizing a CPU.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5.diff.gz
      Size/MD5:    36237 4cf0186e529c8572e63c3e5fa23b8490
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5.dsc
      Size/MD5:     1408 6840b3026fe9ff9c2d1b3bfc9439537a
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4.orig.tar.gz
      Size/MD5:  3598517 1bf195093ed5279412f1047f70fafded

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   149518 d6e01838b9e3ea0a6ac87a946e14f934
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdrb-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   132272 b7b8b94870d094ba4112d01b784ed22c
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/liberb-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   116086 e01642dfaac094d84f79d722a343ff72
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/librexml-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   169266 d68598481a8b39fb1d24eb9149751599
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsoap-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   217882 7c8de749b8a03049e5210a8de0ce6c2e
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtest-unit-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   135050 730a0c59a59656c5f26aeb2c8b1f937c
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libwebrick-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   140548 10e2ab4ab2301c037ac66365608cd442
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libxmlrpc-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   130030 d074e4e99f0ed12cf34cc8afebcd5e9d
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   216690 35789f77e70556893b8095ef08144d75
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   441292 f5165cfd3c11f6ab59f3ba52c4fe4a76
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   125722 f86226d1549be122b14c940ddeb2248a
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.1+1.8.2pre4-1ubuntu0.5_all.deb
      Size/MD5:   135282 8c2a63dbe3ebf140283482f48d8ddb0d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libbigdecimal-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   153334 bec045743599c596c580408fd074b984
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libcurses-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   125830 3416bdebd82eb3c0b0f2d0980221366a
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   118448 877226c72df56d043caf480f687f8b14
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   152266 13b2305e17ecff613ae4841ae375d7b2
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   120004 7537cef5c40dfde22fb3497d56e695db
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libiconv-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   113948 c0ea069afcf5be9d770cd13ef0a144d2
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   215018 65c7cb192eef7d4ab8d9a03619c4439e
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libpty-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   117162 9093ba931f4e29a51987cd19ef7c8214
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libracc-runtime-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   116964 b3b2dd1c7e64b8db3aeee006e9f2d60c
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   115778 4c390aa2468e089eb4794e60882369c6
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   759926 ec0bcd4af5d513baf492931c0bd8dfc6
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   900776 6f2ef849e9a3b86261b9c2c41e35213f
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   121806 f072088e99af30d2320b799d179e6fee
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libstrscan-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   114676 53e573e2aa5b63816058fb41517fa901
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsyslog-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   114856 d05eb5161da92ef62f4e96eeb4f218a7
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   172038 cafceed541ef923fc10312f89f7dd26c
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtk-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:  1142572 cf99bcdc9f218cd8914eba190581d2f2
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libyaml-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   162326 c96728f05e4abb9c486e3d5932b1549f
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libzlib-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   130750 3fa235a0fb04fd44a73f45f190695dbc
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   627132 2a96867277c71db3f13020828ffe1c52
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_amd64.deb
      Size/MD5:   131710 47195dc272ec60c38b416dd8692369dd

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libbigdecimal-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   151520 06424bdd2aae7c38c76b2e60cfdc6f0b
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libcurses-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   123888 b5612826d5e74b46484fc272ebe58e5a
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   117862 92d67035b7df90d77d02c73eca8a895c
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   148652 7e36bf5872c11e40372dc260e2b64fb0
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   118954 2b75c2b368e67f4a05ff0aefa0dec708
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libiconv-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   113486 e8fa5f14ef42dba21ea7bff0c9a280d0
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   203248 56ec0c9ca7be7b806dbc3933bcf0e9f5
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libpty-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   116784 a04df55862ce7e564bd802cc3e256013
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libracc-runtime-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   116232 92bbe00b1a3fc8962b86aa4996b7da43
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   114952 4d97db3c3b25577be01048538e8672e5
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   719586 586176df73d7bd0aaa1f0b35ff91d795
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   856270 19336825dcfd14cae994a1bd1a599fa3
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   120940 ff155af859e2bd649e8c5d14e311f1be
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libstrscan-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   113586 0d11742b2c460f40a6ed062e66c09eb1
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsyslog-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   114308 b5d4c8dd1c8e045be89d849db3bf49cb
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   168278 5b98ac2393da3173ed10b1165822f988
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtk-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:  1142404 28510ab6d478be92e41f307ba2ddbbe8
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libyaml-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   159856 c5b54b9ca81cdcaa3e9a30723b5b878b
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libzlib-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   128922 ea52b4843c90861ebedeb5c14091051f
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   585806 573f4a928f905dc2cb24f30230313a93
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_i386.deb
      Size/MD5:   131466 ef60af9668170bbcb632ae0822f6b1f7

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libbigdecimal-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   155932 8a0cf80a8f10d18073d503743b401189
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libcurses-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   126982 e24b35a95fba450f4597fc0400661553
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   119892 e5aa3787e55d51b805ae5f35d0cd9514
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   150776 08d21c052b05d214f3600c9cc69ebc20
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   121026 480398cdb604a1e1fac68c9a0cece504
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libiconv-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   115288 408ce02ce99efa5030cd8843c24167ba
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   206388 919bb4dc971baab4dfcbd3d4d69deef5
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libpty-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   118398 7a5151fe47703486b43a2cd970dc5dc4
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libracc-runtime-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   118280 b4419022170b2e4ae52ec16721d904b5
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   116866 b501d446424a8ded3bab4cb6564dfba6
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   949710 d4a3c6e7d084f02e73215eb4151a401d
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   910360 f8a1768b16d1a04df7ade7e7cd14a556
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsdbm-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   123092 67645e61d5831a9f41223e346fad74ab
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libstrscan-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   115910 7d87fa06dfbb8179e23db45fb91d4be6
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libsyslog-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   116368 8e78bc993672e92aaec47e9600f3d0af
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   170800 47770cf5023a4bc18aeec3aa0f850126
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtk-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:  1142978 09010c3c7b3dc6ca8541c55f3d40b194
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libyaml-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   160198 a36216f09e27ce3f1f4bb6ed720e37b8
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libzlib-ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   131508 b4163c855ae6b5a6d4172a4492c05abb
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   598942 66ea17a52e3b1110172a219835a56a46
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.1+1.8.2pre4-1ubuntu0.5_powerpc.deb
      Size/MD5:   133388 c7cf8b95628a7c100f0f863d535c8d8a

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.2-9ubuntu1.3.diff.gz
      Size/MD5:   894589 bc74dd6218ff68f2fadf884ee1aed4c8
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.2-9ubuntu1.3.dsc
      Size/MD5:     1030 8ee6f558a861faefda5868fc8b55f84d
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.2.orig.tar.gz
      Size/MD5:  3623780 4bc5254bec262d18cf1ceef03aae8bdf

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.2-9ubuntu1.3_all.deb
      Size/MD5:   178998 b01c858e2ad0dc149c5318541322d100
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.2-9ubuntu1.3_all.deb
      Size/MD5:   244044 06937668d2a3d95f69c519cd86f1878d
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.2-9ubuntu1.3_all.deb
      Size/MD5:   719238 2128b244e619c00659af6dc464554e93
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.2-9ubuntu1.3_all.deb
      Size/MD5:   154368 e1dbb89906ef020c3268a090ed557139
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.2-9ubuntu1.3_all.deb
      Size/MD5:   189056 af6df07e5f517190cedd1b5cfc683f17

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:   141894 dfbc5a239105323f0b77c85db742d4f9
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:   143124 ed77642bf504afa05769e9b8f1e3685e
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:   245034 7f791595578464d6bd666851fa813780
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:   142516 79ce31ad1906d84272a6b1cce6f27d14
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:  1005680 08c04375b59201edae55bd61e723925c
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:  1448308 94a66f48aa76709343251545fbe14a42
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:  1463254 e85eece9ec5b05605f32cdc240695813
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:   686982 9f119a5cb9cb442f3ed0d8b3cc224890
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.2-9ubuntu1.3_amd64.deb
      Size/MD5:   161272 1dc3f3fce335387586a490a563956c94

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:   141166 08e922e8a0d377b13cfe80ecef34deb4
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:   141718 998caa056b212f44551e8c9677e79cb7
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:   230812 c3138a1ada9e223127740df84347b2de
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:   141514 400ff3c048f03944b36721d89745e2d3
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:   837522 87eae4761eca5084ed15283e50cf2f8f
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:  1365660 04e1acfb77147aa3418f2523711eb971
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:  1453132 c430817d913f86eec23e4d6bef7ea5d6
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:   632696 d980cccd8f079bcdef0ac5164301400f
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.2-9ubuntu1.3_i386.deb
      Size/MD5:   161074 c3db0228fc98e73407bab670a5f01147

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:   143440 714bf0ce0ea0b204f28021b66f3233db
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:   143932 8f79fc6cdf15fffcb640e86ce7676709
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:   236270 4d77b7c62ae57f322e3f485fbba965a5
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:   143638 ec1a15264a1636dcb9c66a7842fea177
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:   995800 e6faf92655bce5fdbb5296a830e80d64
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:  1451066 888b9c3c2a350b8b02397c5af3f8ebbf
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:  1462654 ca5229c1e1ae5b7a612800989bd0f190
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:   649874 b2c2bc8692d5e0505b838189a1044c8a
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.2-9ubuntu1.3_powerpc.deb
      Size/MD5:   163018 bbc5f401dc6cb8a9f25d740fa132d060

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.2.diff.gz
      Size/MD5:    35030 4a6318bfb6c2d5e64f0f353d8e7094ef
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.2.dsc
      Size/MD5:     1029 8c9154d657d6ac0c085308a811006ea3
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4.orig.tar.gz
      Size/MD5:  4308915 2994203e0815ea978965de34287c5ea2

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.4-1ubuntu1.2_all.deb
      Size/MD5:   206682 2ee54a5fbadd3067bbb795a1503726dd
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.4-1ubuntu1.2_all.deb
      Size/MD5:   271544 256862d6d7c6eef5a64a4f9bcf18e65e
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.4-1ubuntu1.2_all.deb
      Size/MD5:   756812 c534f01495cce97c1571ca1d52f7ffc1
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.4-1ubuntu1.2_all.deb
      Size/MD5:   181440 86a13e3a66b44a319e64921d4b5bdc1b
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.4-1ubuntu1.2_all.deb
      Size/MD5:   213688 cfe291f37e22173205494277fdbb5f1e

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:   169102 1920b7fb7122b33668ab2812f7a613df
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:   170302 418e66ae4a94b52ca91df2c573b7749d
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:   273734 22337ab38f3bafcd7daf17d74a5bf000
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:   169750 a692ebe4ea6a1a2af6d44fbbc5dc97f0
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:  1041264 7be9554c52bed9130b60dd288d8f93e1
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:  1506114 9cd9da12e87eda35a91c2306a31718e9
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:  1797744 7e32c5735fc5dea0a92d3b38a6d130fe
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:   717284 ef73a37c17a176b64ed11a034a3b2db0
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.2_amd64.deb
      Size/MD5:   188676 42ed4fea2480acc0baea0bf85403acc4

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:   168324 8e5201809da40a9a5fddbfff2bcb66d1
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:   168874 dc331672d058e2d95077cc39cbce97c5
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:   258180 17ad9bf21de71dcfa8bfbcfe45aa6fc4
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:   168744 c01ad280a9e5bf84ef471ac88cd6ac83
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:   870680 c61e622f04a13276fe97d5c59f341080
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:  1419860 7d2a2967b5dadba8b3795be79b8ffe08
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:  1789580 78f1b550293c5b2c651c4652ce1ef5fb
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:   662248 417b39c18d9306bad1efa2a2690dd5ba
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.2_i386.deb
      Size/MD5:   188442 b139692be1c8ed431e628483f1bb4d8b

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:   170564 eb56ec08411e5d6a907df6a2ee72f2c3
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:   171100 27cc84aeef2b976b9bd558d7bec89024
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:   264128 421e83cbe67e567a853606c6742a0e99
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:   170852 9b5b0e5ccf82c053d1e3f63d748e2c0b
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:  1030914 8c56ce8a558370b02b2afdfc6d5e850b
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:  1507906 373eb5464b923f72f9ffd70739a4727b
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:  1797656 84b88e3dcfbf1c4f91fdf509a342a9a1
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:   681294 4337d8aebb3a38680b7d5ed717e8058a
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.2_powerpc.deb
      Size/MD5:   190464 6fe161b19b8d3a85e2d5594830cef75a

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:   168392 deea51e7b0bb0c5d3e848659fab33d90
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:   169224 ec073ce103d94778b6816ff9a3aa4d53
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:   266492 d4482c2a0ff32dc109182c2e7b10baec
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:   169012 87aa6eeab0361c801a9784f9a5edc8f5
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:   914770 686662d36d613e97eb3aba8e5e341120
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:  1461334 2c223efb117548c2ac53a20ba90bb4fe
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:  1793588 b31fbad6c76806cb5f9c49dea70c750f
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:   703040 b6b814570d2014d427cd1549c112c2e5
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.2_sparc.deb
      Size/MD5:   188692 6830cfa4ed0fae38f403ee463b0dac37

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-5ubuntu1.1.diff.gz
      Size/MD5:    77670 0694a30e3701b6639ddd8d475cf762a3
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-5ubuntu1.1.dsc
      Size/MD5:     1056 92cc353b8bf288be8a5d557eed54e8f5
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4.orig.tar.gz
      Size/MD5:  4308915 2994203e0815ea978965de34287c5ea2

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.4-5ubuntu1.1_all.deb
      Size/MD5:   209266 9f1c22095c4e6aa81f4c5d34f64a467b
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.4-5ubuntu1.1_all.deb
      Size/MD5:   274176 0b437ce21327398e88d475fed1e3063c
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.4-5ubuntu1.1_all.deb
      Size/MD5:   776574 a322f493e771f3856d95535bec095113
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.4-5ubuntu1.1_all.deb
      Size/MD5:   184032 11991d08dc9223aa76d62cc68fe4663a
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.4-5ubuntu1.1_all.deb
      Size/MD5:   216324 9a3b2d5675fb8c067065fee77b5f4aaa

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:   171704 5842fb45c0bb1795f01c9e043e7f8865
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:   172840 b8e7857c98b565b1246cbf0217e45d3e
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:   276098 a63c95087e871c97cb3efa0b9f371c15
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:   172332 b27ed50ab9cd1f49db369cc016765c54
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:  1031738 ff8219b0e507dace4184e661d55f535c
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:  1513664 a3c1faab9bea91332aa85d9277105b9a
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:  1799792 a66bcc0ba7e1482241dc4483a7f948b1
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:   720754 46c3895afff48eacb98c48acac9b7daf
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-5ubuntu1.1_amd64.deb
      Size/MD5:   191284 cd1a8d35d3adecb7c5f969bfcb124481

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:   171110 e6ec34f39f44fc0619c8079643d176de
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:   171700 7b0747e007831ea8acd175405ed6405f
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:   263384 7182affaa09d6fdd92bda01bbabe7140
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:   171472 1a5e3eea0bf801716c4c98a3590ed6cf
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:   959908 87297c9865bbf68e77958bbcf463451e
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:  1450888 f150737bc9f0745b9af1d0197a875799
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:  1793598 af32f84036c9b8f6e8bd29c0269cfe98
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:   682522 649deaa614556e79cbab360f6600cd07
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-5ubuntu1.1_i386.deb
      Size/MD5:   191052 62ae00fa453c2d3b239692a76a95eecf

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:   173254 38946094a72824213b08e5b8ff305c49
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:   173796 9d6ad47d20675f5acb185c8e2a789d18
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:   267166 db721fbce8652a5d37ad086639318f92
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:   173458 459ab022a6f18b688b0b41c407417f22
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:  1069520 e28f82077e5a08389c827e3dd02adfeb
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:  1520572 ede5df918a1b72ac5d16888f7db39ab4
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:  1800674 59351cfd303419d429454c094ed2905f
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:   688988 a436a303161161cb40e450980a371dcc
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-5ubuntu1.1_powerpc.deb
      Size/MD5:   193132 c6a96d4bb880e578bcc47b1f654ad0a9

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:   170840 7fe5cc03a075c27b0e1c775cd7104742
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:   171630 c5215e07f80e4305c66d98fd295e8e7b
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:   269270 097645280f6c6f8ef9e8cdddbfe76092
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:   171572 81238f13634afab51692137314a8654d
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:   923524 c285d47bbf8c01666b7f57d19b1e5ff9
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:  1471994 2a77f333458355b8431b3d03d7b69979
    http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:  1796424 2496d35d58db1d9ec17c389db5ec3b79
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:   711500 83d0616487c10872add90adc070234d4
    http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-5ubuntu1.1_sparc.deb
      Size/MD5:   191222 f26bb96445701cd7b17c7487f8c694a7


4.


=========================================================== 
Ubuntu Security Notice USN-372-1          November 01, 2006
imagemagick vulnerability
CVE-2006-5456
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libmagick6                               6:6.0.6.2-2.1ubuntu1.5

Ubuntu 5.10:
  libmagick6                               6:6.2.3.4-1ubuntu1.4

Ubuntu 6.06 LTS:
  libmagick9                               6:6.2.4.5-0.6ubuntu0.3

Ubuntu 6.10:
  libmagick9                               7:6.2.4.5.dfsg1-0.10ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

M. Joonas Pihlaja discovered that ImageMagick did not sufficiently
verify the validity of PALM and DCM images. When processing a
specially crafted image with an application that uses imagemagick,
this could be exploited to execute arbitrary code with the
application's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5.diff.gz
      Size/MD5:   144502 96cdc6266e29aa2ba91e09adc67a3c2a
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5.dsc
      Size/MD5:      899 6bb10253b54d9b68b99ab5e117d0bb86
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
      Size/MD5:  6824001 477a361ba0154cc2423726fab4a3f57c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_amd64.deb
      Size/MD5:  1466726 30529972b274e75f686f38aab2e27e36
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_amd64.deb
      Size/MD5:   229236 13fa208a5cb5f6acdfd271836b39e2f0
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_amd64.deb
      Size/MD5:   164022 e4b7c3ed32275b45e7a982bc9be16710
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_amd64.deb
      Size/MD5:  1551474 6a6e325d036aa7369e42ea7bc60223b4
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_amd64.deb
      Size/MD5:  1195388 38967817dd23a96f6cbbe996c26d86bc
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_amd64.deb
      Size/MD5:   232262 3ae7c25400744ee24260453e4a952406

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_i386.deb
      Size/MD5:  1465348 e4330a298179425f3d88db6f308f6520
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_i386.deb
      Size/MD5:   209222 879366413a35554aed05bcf9f27f038b
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_i386.deb
      Size/MD5:   164516 21497849c6a53e77db86cf217ce5d81a
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_i386.deb
      Size/MD5:  1454216 12f86d30660e81477ead1ac3e4ed383c
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_i386.deb
      Size/MD5:  1140964 c289aa3e81f0d5106d2fd9d23ba1795e
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_i386.deb
      Size/MD5:   232642 8b317e6dfe26d08b31bc536d2c083827

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.0.6.2-2.1ubuntu1.5_powerpc.deb
      Size/MD5:  1472140 b3b445e1a7af2910ed9e7f8be844f909
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.1ubuntu1.5_powerpc.deb
      Size/MD5:   228208 99d28d5a4b541a032d52754eebe7aba9
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6_6.0.6.2-2.1ubuntu1.5_powerpc.deb
      Size/MD5:   157202 e5553dbb2bf94dac87e16114652f029f
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.1ubuntu1.5_powerpc.deb
      Size/MD5:  1686432 ad415b90f40c1ab31e023f1df6adcb4e
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.0.6.2-2.1ubuntu1.5_powerpc.deb
      Size/MD5:  1170248 7a16caf06e3834dffccc4652cd302993
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.0.6.2-2.1ubuntu1.5_powerpc.deb
      Size/MD5:   270978 caebe7cef826261b11fb068008ed60b9

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.4.diff.gz
      Size/MD5:   143918 8dd23724e67f3bddc3aa84605f0cf6ca
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.4.dsc
      Size/MD5:      899 58b91b7ec00b5d0483ce070f1e8388bc
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4.orig.tar.gz
      Size/MD5:  5769194 7e9a3edd467a400a74126eb4a18e31ef

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.4_amd64.deb
      Size/MD5:  1333988 953a195e7ae503626c3320dde7ed72cd
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.4_amd64.deb
      Size/MD5:   259426 1ce1270fd1c49e1fa024db846961f89f
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.4_amd64.deb
      Size/MD5:   171470 b3ad7733bfca4788ec88a2fd08ec2a2a
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.4_amd64.deb
      Size/MD5:  1671122 ace2bb83eb946dad1e7f012335d67943
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.4_amd64.deb
      Size/MD5:  1320760 d493aac8bd7dd16cca3096f5d9f835fe
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.4_amd64.deb
      Size/MD5:   169552 143d04e6a8035168db89f360e2051903

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.4_i386.deb
      Size/MD5:  1332978 f5ca133a3cb76d652890107068d574c9
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.4_i386.deb
      Size/MD5:   235898 3f80065faaddcd92662c9f6df86b48ab
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.4_i386.deb
      Size/MD5:   170780 21bc4938d624abefecbca9afe4f1d09e
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.4_i386.deb
      Size/MD5:  1522028 ac538e3ea0f6aef84770fbbced0c6072
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.4_i386.deb
      Size/MD5:  1224692 8b4e831c757e7b305f72605cb48e02e4
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.4_i386.deb
      Size/MD5:   164840 90d8363550b649be4705859523e9a02d

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.4_powerpc.deb
      Size/MD5:  1337886 0aecb181a2b3b7f52a23155510ade72f
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.4_powerpc.deb
      Size/MD5:   260388 71d0ac72531c2254b8e304142f417af3
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.4_powerpc.deb
      Size/MD5:   164022 28092bac7b94dabc59dca24df10d7cdc
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.4_powerpc.deb
      Size/MD5:  1874510 39c305e0addd1a94284dcde33ab9df14
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.4_powerpc.deb
      Size/MD5:  1258286 39cbb88bc58c3280e4401ed9116860e8
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.4_powerpc.deb
      Size/MD5:   163992 c3d41c62be266f2c3fe9c266461b545c

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.3.4-1ubuntu1.4_sparc.deb
      Size/MD5:  1333190 ac554f62e1686ed621a4bab21369f882
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6-dev_6.2.3.4-1ubuntu1.4_sparc.deb
      Size/MD5:   237060 9f9ff69dfc760f18e3eb8b6a6603fa91
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++6c2_6.2.3.4-1ubuntu1.4_sparc.deb
      Size/MD5:   168936 a2f50904d9d1637907c7d2e103556d28
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6-dev_6.2.3.4-1ubuntu1.4_sparc.deb
      Size/MD5:  1782272 7f03f5d6d7d9018d7c5e5237b93f6c05
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick6_6.2.3.4-1ubuntu1.4_sparc.deb
      Size/MD5:  1323962 9106e33d17d389e0626da180ec012701
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.3.4-1ubuntu1.4_sparc.deb
      Size/MD5:   166308 d78a02bd5ed9ff975bf7cb3cab6632d8

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.3.diff.gz
      Size/MD5:    35130 1faf498a57ec6e5ea18e0c072cf9a8d9
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.3.dsc
      Size/MD5:      916 a4f711630724113301dbfeb2df4395e0
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.orig.tar.gz
      Size/MD5:  6085147 8d790a280f355489d0cfb6d36ce6751f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.3_amd64.deb
      Size/MD5:  1615954 2149178d9fd28897a3c6fd2c491e9446
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.3_amd64.deb
      Size/MD5:   249206 1ff95a0af9f962edaee38ccfc856c564
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.3_amd64.deb
      Size/MD5:   170104 8ccdedbe851271b799534d38fa8aef30
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.3_amd64.deb
      Size/MD5:  1702484 31c88d7cf9159809dec0265e537973ac
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.3_amd64.deb
      Size/MD5:  1347912 04536a33add640f7b564b50d33336bea
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.3_amd64.deb
      Size/MD5:   171830 176568b8c0ebece007649cef8951c08a

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.3_i386.deb
      Size/MD5:  1614696 e1b8f9848856a58f55fae279565dc076
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.3_i386.deb
      Size/MD5:   227008 3ff3355410937ac247eee0fe4a9a4365
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.3_i386.deb
      Size/MD5:   168354 58b9bee7ed0d3bd618044e9340e9d7f5
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.3_i386.deb
      Size/MD5:  1555878 98034bd5a96af0678965806cd168494c
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.3_i386.deb
      Size/MD5:  1246892 c2e40b0384bbc3340cd92121338704a1
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.3_i386.deb
      Size/MD5:   167218 826e884e629bd435974a0b20fd44fe6b

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.3_powerpc.deb
      Size/MD5:  1619690 3dfc04ee370a409652df16a60f55bdf5
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.3_powerpc.deb
      Size/MD5:   251396 2cac68d5d4e7cf88b85840030017b5a2
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.3_powerpc.deb
      Size/MD5:   162346 e7c2100db6cca74fca43befa56ca3135
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.3_powerpc.deb
      Size/MD5:  1905896 857f0ca00902dbb2195a7f95c84b17ba
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.3_powerpc.deb
      Size/MD5:  1283792 89ea0de0689c8cbc0917897c29814081
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.3_powerpc.deb
      Size/MD5:   166220 f2837b5763a471a65ee4cffd251a1503

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5-0.6ubuntu0.3_sparc.deb
      Size/MD5:  1615312 1d393ab5bb9789c53d104a7200aadcb3
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5-0.6ubuntu0.3_sparc.deb
      Size/MD5:   229182 f56aac12573aa0a8477f6a732ff215b8
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5-0.6ubuntu0.3_sparc.deb
      Size/MD5:   167186 69fa08c7e568bea4961fc7fee4bff779
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5-0.6ubuntu0.3_sparc.deb
      Size/MD5:  1807408 bfc3327e022be55b55824cf9b7f078c6
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5-0.6ubuntu0.3_sparc.deb
      Size/MD5:  1343696 8449022de57855311a3c13ac77f90354
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5-0.6ubuntu0.3_sparc.deb
      Size/MD5:   168932 2b90f44f162105b1770a144f12240025

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.dfsg1-0.10ubuntu0.1.diff.gz
      Size/MD5:    86939 0273702247d7029c19088435a1188690
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.dfsg1-0.10ubuntu0.1.dsc
      Size/MD5:      953 bf00204c47b4e2dd48f2280e458b9820
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.dfsg1.orig.tar.gz
      Size/MD5:  5203463 2c5d3723d25c4119cf003efce2161c56

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.dfsg1-0.10ubuntu0.1_amd64.deb
      Size/MD5:   742750 8e706a5eeaeee60ecfff5c704fd9ed6f
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_amd64.deb
      Size/MD5:   247648 a9819de3bafafb2a7855c957fbf13593
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5.dfsg1-0.10ubuntu0.1_amd64.deb
      Size/MD5:   170128 5d5e867d47238a09a3e9fab4e402b171
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_amd64.deb
      Size/MD5:  1683534 f8150bfa217135f714c68970b365ee68
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5.dfsg1-0.10ubuntu0.1_amd64.deb
      Size/MD5:  1330040 81ce158df2d4bd616081489a1a30ac30
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5.dfsg1-0.10ubuntu0.1_amd64.deb
      Size/MD5:   172158 122abf0e656fe204bcf32c0f249e5cde

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.dfsg1-0.10ubuntu0.1_i386.deb
      Size/MD5:   742224 fcf8dcb974fa4347a31e69487a21e6c3
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_i386.deb
      Size/MD5:   227188 b6bd454c5bd7a6a1b8cd1c0e43a0ec89
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5.dfsg1-0.10ubuntu0.1_i386.deb
      Size/MD5:   168936 67eee244ac112b7edd7ddadd25fa5353
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_i386.deb
      Size/MD5:  1591000 e99e8b130b7fec1522ab151281418f67
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5.dfsg1-0.10ubuntu0.1_i386.deb
      Size/MD5:  1285390 67b32783d2f0000da5b522c10253bfa9
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5.dfsg1-0.10ubuntu0.1_i386.deb
      Size/MD5:   167698 c4989f6e88349832aaf50bce0380c3f2

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.dfsg1-0.10ubuntu0.1_powerpc.deb
      Size/MD5:   746286 fb8c901a8cdd6f41cca02ac7b54b361d
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_powerpc.deb
      Size/MD5:   251506 6a600c74335588865deb38857dc92a24
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5.dfsg1-0.10ubuntu0.1_powerpc.deb
      Size/MD5:   162654 3a31cfd5f5ed88277ca5e1b336eb4d0d
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_powerpc.deb
      Size/MD5:  1918166 1e7529e780454da1ef84b3d70c86b9b4
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5.dfsg1-0.10ubuntu0.1_powerpc.deb
      Size/MD5:  1296618 7a76234a2cacec2e3790c02d09084e4b
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5.dfsg1-0.10ubuntu0.1_powerpc.deb
      Size/MD5:   168368 9513e0612c2f3d75f0bdc4144a8967e5

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/imagemagick_6.2.4.5.dfsg1-0.10ubuntu0.1_sparc.deb
      Size/MD5:   742250 1d039fa163cdf20c97d84102c5eb2af3
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_sparc.deb
      Size/MD5:   229050 fb7f29883dd5a5f99d419592383ab4f9
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick++9c2a_6.2.4.5.dfsg1-0.10ubuntu0.1_sparc.deb
      Size/MD5:   167680 8a7570a56925c201d594cf3c771ce34e
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9-dev_6.2.4.5.dfsg1-0.10ubuntu0.1_sparc.deb
      Size/MD5:  1854042 4357668480e4dd2e05d1e58895513330
    http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/libmagick9_6.2.4.5.dfsg1-0.10ubuntu0.1_sparc.deb
      Size/MD5:  1382884 5dda6687e4de0884de79d1529b146e8b
    http://security.ubuntu.com/ubuntu/pool/universe/i/imagemagick/perlmagick_6.2.4.5.dfsg1-0.10ubuntu0.1_sparc.deb
      Size/MD5:   173864 531d3f68c8cb859291a66f7657402e67




5.


=========================================================== 
Ubuntu Security Notice USN-373-1          November 01, 2006
mutt vulnerabilities
CVE-2006-5297, CVE-2006-5298
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  mutt                                     1.5.9-2ubuntu1.2

Ubuntu 6.06 LTS:
  mutt                                     1.5.11-3ubuntu2.2

Ubuntu 6.10:
  mutt                                     1.5.12-1ubuntu1.1

After a standard system upgrade you need to restart mutt to effect the 
necessary changes.

Details follow:

Race conditions were discovered in mutt's handling of temporary files.  
Under certain conditions when using a shared temp directory (the 
default), other local users could overwrite arbitrary files owned by the 
user running mutt.  This vulnerability is more likely when the temp 
directory is over NFS.


Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.2.diff.gz
      Size/MD5:    94051 44a298795bfed9dad61cb13ad6613373
    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.2.dsc
      Size/MD5:      781 5f99006e61b707b6b5e1766694a1fa02
    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9.orig.tar.gz
      Size/MD5:  3033253 587dd1d8f44361b73b82ef64eb30c3a0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.2_amd64.deb
      Size/MD5:   731908 70dcc1e0c188642e0e33f78d9042d413

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.2_i386.deb
      Size/MD5:   680158 b72fb699dd4960b85093fba91d7882bc

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.2_powerpc.deb
      Size/MD5:   725690 e6f151b9bd4053ea48ea29b4f474ddec

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.9-2ubuntu1.2_sparc.deb
      Size/MD5:   697634 8b8a6fadab315b826db56a77adb003b5

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.2.diff.gz
      Size/MD5:   417839 7fc3fbca7a2532c8299d9f5abf50063c
    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.2.dsc
      Size/MD5:      749 cf87540f9b41135b360a3a50427c7cbb
    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11.orig.tar.gz
      Size/MD5:  3187076 30f165fdfaf474521a640f1f3886069a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.2_amd64.deb
      Size/MD5:   961092 6c7028e9a210d3cfb19ae8233598f2a9

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.2_i386.deb
      Size/MD5:   907980 657ded1e8e7887f93f7e067ad2d62bae

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.2_powerpc.deb
      Size/MD5:   957334 08aad1d84d5ea91af31221a8f81d285c

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.11-3ubuntu2.2_sparc.deb
      Size/MD5:   925302 3e66e893cb497f918e35c64e32abaeda

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.12-1ubuntu1.1.diff.gz
      Size/MD5:   136823 71bb1c771dc6c257ed6624a59b41bff7
    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.12-1ubuntu1.1.dsc
      Size/MD5:      749 a49828c3436c2783fb40670fb167864a
    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.12.orig.tar.gz
      Size/MD5:  3440835 57196c816211a72900fdc54341eb0132

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.12-1ubuntu1.1_amd64.deb
      Size/MD5:  1832512 1f5479a1c3d11b5d91d01a979612fcd8

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.12-1ubuntu1.1_i386.deb
      Size/MD5:  1014220 c07a5f19d5aa5a282bbae2964f3d3393

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.12-1ubuntu1.1_powerpc.deb
      Size/MD5:  1049642 a9b3c0e14c3a01be49af7e05697d83a6

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/m/mutt/mutt_1.5.12-1ubuntu1.1_sparc.deb
      Size/MD5:  1806914 3b36cf505556b256a60d6d9b090559fd


6.


=========================================================== 
Ubuntu Security Notice USN-374-1          November 01, 2006
wv vulnerability
CVE-2006-4513
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.10:
  libwv-1.2-1                              1.2.1-2ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

An integer overflow was discovered in the DOC file parser of the wv 
library.  By tricking a user into opening a specially crafted MSWord 
(.DOC) file, remote attackers could execute arbitrary code with the 
user's privileges.


Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/w/wv/wv_1.2.1-2ubuntu0.1.diff.gz
      Size/MD5:    11929 1162b872e4e77345295a34e0c7fb731b
    http://security.ubuntu.com/ubuntu/pool/main/w/wv/wv_1.2.1-2ubuntu0.1.dsc
      Size/MD5:      716 4ec3816084073a77df966ff2fec1a40e
    http://security.ubuntu.com/ubuntu/pool/main/w/wv/wv_1.2.1.orig.tar.gz
      Size/MD5:   628027 d757080af4595839d5d82a1a573c692c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-1.2-1_1.2.1-2ubuntu0.1_amd64.deb
      Size/MD5:   146278 3eb3817dfa782c6e3bcc22c6fb35b8ad
    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-dev_1.2.1-2ubuntu0.1_amd64.deb
      Size/MD5:   202772 30ebeb74c64333e33d5604df48a0f8f0
    http://security.ubuntu.com/ubuntu/pool/universe/w/wv/wv_1.2.1-2ubuntu0.1_amd64.deb
      Size/MD5:    90506 a1835a5db7c038487567686e77a95f9a

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-1.2-1_1.2.1-2ubuntu0.1_i386.deb
      Size/MD5:   138724 918761ea08c2eb366821648adc571bc3
    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-dev_1.2.1-2ubuntu0.1_i386.deb
      Size/MD5:   180656 f041845463774af932bdd8a848422481
    http://security.ubuntu.com/ubuntu/pool/universe/w/wv/wv_1.2.1-2ubuntu0.1_i386.deb
      Size/MD5:    88162 3940c61f26c24d2ac1f66d33a7f00166

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-1.2-1_1.2.1-2ubuntu0.1_powerpc.deb
      Size/MD5:   140532 6f76eefa75620e73bfe7738e67618bab
    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-dev_1.2.1-2ubuntu0.1_powerpc.deb
      Size/MD5:   207102 d241cdb9f374c6f6b61c7ce9667f79b6
    http://security.ubuntu.com/ubuntu/pool/universe/w/wv/wv_1.2.1-2ubuntu0.1_powerpc.deb
      Size/MD5:    94366 682568966d755eb3e55ef210ff08dd05

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-1.2-1_1.2.1-2ubuntu0.1_sparc.deb
      Size/MD5:   136236 a8a17256755dfb88d996972dd76736d7
    http://security.ubuntu.com/ubuntu/pool/main/w/wv/libwv-dev_1.2.1-2ubuntu0.1_sparc.deb
      Size/MD5:   189474 7e263e180bcf218dd6714ab813c9bf97
    http://security.ubuntu.com/ubuntu/pool/universe/w/wv/wv_1.2.1-2ubuntu0.1_sparc.deb
      Size/MD5:    88130 413b2fb70a223db99545e4e3ccbe2145


______________________________________________________________________________



NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk
by telephone.  You may send Not Protectively Marked information via
e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

UNIRAS wishes to acknowledge the contributions of Ubuntu for the
information contained in this briefing.
______________________________________________________________________________

This notice contains information released by the original author.
Some of the information may have changed since it was released. If the
vulnerability affects you, it may be prudent to retrieve the advisory
from the site of the original source to ensure that you receive the most
current information concerning that problem.

Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or
imply its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall not be liable for any loss or damage whatsoever, arising from or
in connection with the usage of information contained within this
notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response
Teams (IRTs) in order to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote
information sharing amongst its members and the community at large.
______________________________________________________________________________

<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRUnkBml7oeQsXfKvEQKR1wCg4H7nZhOTgFUeh1csC+xSHjVxrokAoMUj
NibJuD1NinLFJqBfX8sy8g9P
=nIXw
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________